Disable: 'User Account Control: Virtualize file and registry write failures to per-user locations'
|ID: oval:org.secpod.oval:def:35196||Date: (C)2016-06-10 (M)2017-10-23|
|Class: COMPLIANCE||Family: windows|
This policy setting controls whether application write failures are redirected to defined registry and file system locations. This policy setting mitigates applications that run as administrator and write run-time application data to %ProgramFiles%, %Windir%, %Windir%\system32, or HKLM\Software.
The options are:
- Enabled: (Default) Application write failures are redirected at run time to defined user locations for both the file system and registry.
- Disabled: Applications that write data to protected locations fail.
|Microsoft Windows 10|